A key distributer node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with first and second access nodes for a terminal integrated wirelessly into the network, at least one processor connected to the memory device and the data communication device, wherein functions are provided for the processor(s) that allow authentication of the terminal at the second access node in response to a key request received by the second access node, a derivation of a second key from the first key, and triggered transmission of the second key through the data communication device to the second access node. Connections to the network's first and second access nodes with security relationships can be provided for the key distributor node when using the first key.
|
12. A method for authenticating a terminal during a handover procedure in a network comprising:
a key distributor node authenticating a first access node of a network to form a security relationship between the first access node and the key distributor node;
the key distributor node authenticating a second access node of the network to form a security relationship between the second access node and the key distributor node;
in response to a request for a second key that the key distributor node receives from the second access node for forming a security relationship between the second access node and a communication terminal that has moved away from a wireless cell of the first access node toward a wireless cell of the second access node, the key distributor node generating the second key by deriving that second key from a first key saved in a storage device accessible by the key distributor node and subsequently sending the derived second key to the second access node, the first key being a pre-existing key that was previously saved by the key distributor node when forming the security relationship between the second access node and the key distributor node prior to the key distributor node receiving the request for the second key from the second access node.
1. A key distributor node, comprising:
a memory device with at least one first key, said first key derived from a master key for building a secure relationship;
at least one data communication device configured to exchange data with first and second access nodes integrated into a network in which the key distributor node is connected, wherein the first key is derived from the master key during establishment of a security relationship between the second access node and the key distributor node,
at least one processor connected to the memory device and the data communication device,
wherein functions are provided for the at least one processor to complete a handover of a terminal from the first access node to the second access node by responding to a received key request from the terminal via the second access node using the established security relationship with the key distributor node by:
deriving a second key from the first key in response to the key request at the key distributor node, and
transmitting the derived second key to the second access node via the data communication device and forwarding the second key to the terminal to establish a secure relationship for communications between the terminal and the second access node in order to complete the handover without the second access node forming a secure relationship with the first access node.
17. A non-transitory computer-readable storage media comprising instructions that are executable by a key distributor node that, when implemented, result in the key distributor node performing a method comprising:
the key distributor node authenticating a first access node of a network to form a security relationship between the first access node and the key distributor node;
the key distributor node authenticating a second access node of the network to form a security relationship between the second access node and the key distributor node;
the key distributor node responding to a request for a first key from the second access node for use in forming a security relationship between the second access node and a communication terminal that is received after the first and second access nodes were authenticated by the key distributor node by generating the first key by deriving that first key from a second key saved in a storage device accessible by the key distributor node that was formed during the authenticating of the second access node of the network to form the security relationship between the second access node and the key distributor node and subsequently sending the derived first key to the second access node, wherein the generated first key derived from the second key that is sent to the second access node is usable for facilitating a handover for associating the communication terminal with the second access node without an establishment of a secure relationship between the first access node and the second access node for performing the handover.
2. The key distributor node of
3. The key distributor node of
4. The key distributor node of
6. The key distributor node of
7. A combination comprising the key distributor node of
8. The combination of
9. A network comprising the key distributor node of
14. The method of
16. The method of
18. The non-transitory computer-readable storage media of
19. The non-transitory computer-readable storage media of
20. The non-transitory computer-readable storage media of
wherein the key distributor node is an authentication server or is a node of a mesh network.
|
This application is a continuation application of U.S. patent application Ser. No. 14/858,018, which claims priority to U.S. patent application Ser. No. 13/498,029, which is the United States national phase under 35 U.S.C. § 371 of PCT International Patent Application No. PCT/EP2011/001934, filed on Apr. 15, 2011, and claiming priority to German Application No. 10 2010 018 286.9, filed on Apr. 26, 2010.
Field of the Invention
Embodiments are typically in the field of wireless networks.
Background of Related Art
Wireless networks are increasingly being used in homes and offices. Mesh networks are wireless networks with a flexible topology. Meshable nodes of a mesh network have features to detect topology changes or to establish fallback routes.
For the Internet, real-time applications such as Voice-over-IP (VoIP) or Video-on-Demand (VoD) are known. Endpoints of real-time communication are usually so-called “stations” or “clients”, i.e., non-meshable terminals.
For integration into a mesh network, these terminals must be associated with access nodes of the mesh network. In response to topology changes in the mesh network or the movements of a terminal across multiple wireless cells of the mesh network's access nodes, handover procedures are provided in which the terminal associated with an access node newly associates with another access node of the mesh network.
The speed of the handover procedures for real-time applications is especially critical for the quality and feasibility of such real-time applications using wireless connections. To enable real-time capabilities for non-meshable terminals, the handover procedures from one access node to another should therefore occur with the least possible lag time and packet loss.
802.11 networks operate with fixed access nodes, which usually communicate with each other via wired connections.
In mesh networks, communication for key distribution between access nodes is less reliable than with wired communication, due to the wireless transmission, and experiences increased delays due to multi-hop communication. This results in slower handover procedures in mesh networks. Due to the mobility of both mesh nodes and terminals or stations, handover procedures also occur more frequently in mesh networks. The mobility of both mesh nodes and terminals can lead to an increased number of handover procedures. In mesh networks, access nodes operate error-prone communication via a wireless medium, which is typically also carried out across several wireless hops. Thus, a request of a PMK-R1 key through an access node with which a terminal must newly associate requires time, and the handover is delayed.
The IEEE 802.11F standard indicates handover mechanisms in 802.11 networks and is documented in IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, 2003. It does not include any mechanisms for optimizing a handover procedure.
The 802.21 standard concerns the communication and execution of a handover procedure between heterogeneous networks and is documented in Standard for Media Independent Handover Services, IEEE Computer Society/Local and Metropolitan Area Networks, Draft 802.21-Standard, 2004.
Bruce McMurdo, Cisco Fast Secure Roaming, 2004 demonstrates an acceleration of authentication after initiating a handover.
To speed up handover procedures, the utilization of several interfaces is demonstrated in Catherine Rosenberg, Edwin K. P. Chong, Hosame Abu-Amara, Jeongjoon Lee, Efficient Roaming over Heterogeneous Wireless Networks, Proceedings of WNCG Wireless Networking Symposium, 2003. To this end, authentication with the new access node is already carried out while the station is still connected to the old node via the second interface.
A standardization for fast handover procedures in wireless 802.11 networks is shown in Draft Amendment to Standard for Information Technology—Telecommunications and Information Exchange between Systems—LAN/MAN Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 2: Fast BSS Transition, D2.0, March 2006.
According to the IEEE 802.11r standard, a special key hierarchy is used in wireless 802.11 networks in order to optimize handover procedures. This standardized version of key distribution, in which a node is adapted as in the preamble in claim 1, is such that a security relationship with the PMK-R0 key holder must be requested first at the Mobility Domain Controller (MDC), before a PMK-R1 key can be transferred for the handover procedure. This delays the handover procedure.
After its initial registration, each access node calculates a PMK-R0 key within a mobility domain. Using a mobility domain controller MDC, it establishes a security relationship with a PMK-R0 key holder. After successful authentication, said key holder is derived from the negotiated master key and is stored on the access node MAP1, where the new access node MAP2 logs on for the first time. This access node MAP1 is also referred to as PMK-R0 key holder. Then, a so-called PMK-R1 key, which forms the basis for protecting the communication between access nodes and a terminal STA, is derived from the PMK-R0 key.
The new meshable access node MAP2 receives an authentication request from the terminal STA, which initiates the handover procedure. If the terminal STA initiates a handover procedure in a step S1, then the new access node MAP2 establishes a security relationship with the access node MAP1, which is the PMK-R0 key holder, in a step S0 using the mobility domain controller MDC. There, in a step S2′, it requests its “own” PMK-R1 key, which serves as the basis for the protection of the new communication relationship between the terminal STA and the new access node MAP2. To this end, in a step S3′ the access node MAP1 derives the PMK-R1 key from the PMK-R0 key, and in a step S4′ it transmits the PMK-R1 key to the new access node MAP2. The new access node MAP2 then transmits an authentication response to the terminal in a step S5′, whereupon the terminal associates with the new access node MAP2 in a step S6 such that the handover procedure can be concluded successfully without renewed authentication of the terminal.
Although doing so is not required by the claims unless stated therein, we desire to improve the speed and/or quality of a handover procedure between a first and a second or new access node for a terminal that is integrated wirelessly into the network, and to simplify that handover procedure.
To this end, embodiments of the invention concern a key distributer node for a mesh network, which comprises:
According to an embodiment of the invention, the key distributor node has connections to the mesh network's first and second access nodes with security relationships that are already established when the key request is received by the second access node when using the first key.
Aspects and an exemplary embodiment of the invention are described below with reference to the figures, in which:
Embodiments of the invention concern a key distributor node for a network, which is connected to first and second access nodes in the network for a terminal device that is integrated wirelessly into the network. Embodiments also relate to a combination of that node and the first and second access nodes. Embodiments further concern a network comprising this combination and the terminal device. Embodiments may relate a method for authenticating the terminal device in the network and a computer program with features for implementing the method. Embodiments can be used in a Voice-over-IP application and a Video-on-Demand application, in particular in a local network, especially a WLAN. Embodiments can be used specifically in mesh networks.
The first key can therefore be a PMK-R0 key.
Using the node according to the invention eliminates the communication designated as S0 in
The key distributor node can be an authentication server, for example.
If there is an authentication server, it can be used to store the PMK-R0 key. In that case, the PMK-R0 key holder would then be the authentication server, and no longer an initial access node. The advantage of this is that the Mobility Domain Controller MDC shown in
If there is already an authentication server in the network, it can be expanded so that the Mobility Domain Controller MDC shown in
In one embodiment of the invention, the key distributor node is a node of the mesh network.
In this embodiment, it is not necessary for all PMK-R0 keys to be consigned to a central authority, so that the entire network is not affected if there is a problem in one area. Instead, PMK-R0 keys can advantageously be consigned to multiple central authorities with replication.
Most of all, in small mesh networks, it is advantageous to eliminate the need for hardware resources such as an authentication server and instead use a designated node for key distribution. Proprietary solutions that provide for initial authentication by means of technical features such as the MAC address of a terminal or by physically installing a root key, using USE sticks, for example, can therefore be implemented.
Also, in larger mesh networks with authentication servers, such designated nodes can be used, for example, in such a way that a central node plays the role of “authenticator” for each authentication. In such cases, in which there are additional designated nodes in the network with which each node is connected, expansion is possible such that each designated node plays the role of PMK-R0 key holder, instead of having an authentication server.
The first and second keys are preferably symmetrical key pairs, also called PMK.
The invention also concerns the combination of at least one key distributor node according to the invention and the aforementioned first and second access nodes.
In a preferred embodiment of the combination according to the invention, the first and second access nodes are nodes in a mesh network.
The combination according to the invention can form a mesh network with the terminal or multiple terminals.
One method of authenticating the terminal during a handover procedure in the mesh network according to the invention comprises the following sequential steps:
According to one embodiment of the invention, the preceding steps S1-S6 are performed if the terminal is located in a wireless cell overlap area of the first and second access nodes.
It is possible to configure the nodes with a storage device, wherein an initial authentication of the first and/or second access node is preferably performed before step S1 at the key distributor node, specifically by storing the first key in the storage device.
The invention also includes a computer program with features corresponding to a method according to the invention.
The invention can be used in a real-time network application such as a Voice-over-IP application or a Video-on-Demand application and/or in a local network, especially a WLAN.
In the invention's key distributor node shown in
This key distributor node is used in a network illustrated in
The network shown in
In the network topology shown in
The authentication comprises the following sequential steps:
If there is an authentication server, there is no need for communication with the Mobility Domain Controller to establish a security relationship with the PMK-R0 key holder of a station, since the authentication server, which has already set up a security relationship with all access nodes, handles the management and storage of the PMK-R0 key. Such a feature prevents delays caused by requesting the PMK-R1 key required for a handover procedure. Thus, it is possible to further speed up a handover procedure in mesh networks, and real-time applications such as Voice-over-IP can be better supported.
Bahr, Michael, Gamer, Thomas, Roth, Matthias, Schwingenschlogl, Christian
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7707415, | Sep 07 2006 | ARRIS ENTERPRISES LLC | Tunneling security association messages through a mesh network |
9860220, | Apr 26 2010 | UNIFY BETEILIGUNGSVERWALTUNG GMBH & CO KG | Methods and devices having a key distributor function for improving the speed and quality of a handover |
20040199789, | |||
20070110009, | |||
20070121947, | |||
20070250713, | |||
20080065884, | |||
20080070577, | |||
20080137853, | |||
20080316988, | |||
20090116647, | |||
20090170476, | |||
20090210699, | |||
20090210710, | |||
20100211790, | |||
20100257364, | |||
CN101079705, | |||
CN101163013, | |||
EP1439667, | |||
EP2288194, | |||
WO2009154277, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 30 2014 | UNIFY GMBH & CO KG | UNIFY PATENTE GMBH & CO KG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 065627 | /0001 | |
Sep 27 2015 | GAMER, THOMAS | UNIFY GMBH & CO KG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043116 | /0491 | |
Sep 30 2015 | ROTH, MATTHIAS | UNIFY GMBH & CO KG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043116 | /0491 | |
Sep 30 2015 | BAHR, MICHAEL | UNIFY GMBH & CO KG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043116 | /0491 | |
Jan 06 2016 | SCHWINGENSCHLOGL, CHRISTIAN | UNIFY GMBH & CO KG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043116 | /0491 | |
Jul 26 2017 | Unify GmbH & Co. KG | (assignment on the face of the patent) | / | |||
Oct 30 2023 | UNIFY PATENTE GMBH & CO KG | CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066197 | /0073 | |
Jul 03 2024 | UNIFY PATENTE GMBH & CO KG | UNIFY BETEILIGUNGSVERWALTUNG GMBH & CO KG | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 069242 | /0312 | |
Dec 03 2024 | UBS AG, STAMFORD BRANCH, AS LEGAL SUCCESSOR TO CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH | WILMINGTON SAVINGS FUND SOCIETY, FSB | NOTICE OF SUCCCESSION OF AGENCY - 2L | 069896 | /0001 | |
Dec 03 2024 | UBS AG, STAMFORD BRANCH, AS LEGAL SUCCESSOR TO CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH | WILMINGTON SAVINGS FUND SOCIETY, FSB | NOTICE OF SUCCCESSION OF AGENCY - PL | 069895 | /0755 | |
Dec 03 2024 | UBS AG, STAMFORD BRANCH, AS LEGAL SUCCESSOR TO CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH | WILMINGTON SAVINGS FUND SOCIETY, FSB | NOTICE OF SUCCCESSION OF AGENCY - 3L | 070006 | /0268 |
Date | Maintenance Fee Events |
Oct 13 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 23 2022 | 4 years fee payment window open |
Oct 23 2022 | 6 months grace period start (w surcharge) |
Apr 23 2023 | patent expiry (for year 4) |
Apr 23 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 23 2026 | 8 years fee payment window open |
Oct 23 2026 | 6 months grace period start (w surcharge) |
Apr 23 2027 | patent expiry (for year 8) |
Apr 23 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 23 2030 | 12 years fee payment window open |
Oct 23 2030 | 6 months grace period start (w surcharge) |
Apr 23 2031 | patent expiry (for year 12) |
Apr 23 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |